Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is the Computer Fraud and Abuse Act (CFAA)?

The U.S. Federal Government passed the Computer Fraud and Abuse Act (18 U.S.C.§1030) (CFAA) in 1986 as an amendment to the Comprehensive Crime Control Act of 1984, which included the first federal computer crime statute. Since enacting the CFAA, congress and the federal government have amended the act multiple times to extend its reach and impose criminal and civil liability on additional malicious computer activities.

Choosing Automated Risk Remediation Software (in 2023)

When it comes to improving your cybersecurity posture, few strategies have as much of an impact as your cyber risk remediation program. Efficient risk remediation ensures security risks and vulnerabilities are shut down faster, reducing the potential risks of data breaches and their financial impacts. The cornerstone of an efficient remediation program is cyber risk remediation software that automates manual processes to improve the efficacy of risk mitigation efforts.

Application Security Requirements: Trends and Best Practices

Ensuring application security is not just about protecting data. It’s about safeguarding your company's reputation, keeping customer trust, and adhering to increasingly stringent regulatory requirements. Read on as we delve into application security requirements: the pressing security threats impacting applications, the critical security requirements your application needs to meet, and the best practices to adopt to achieve robust application security.

Integrated Intelligence Enrichment With Threat Intelligence Management

SOC analysts are overwhelmed with alerts and manual repetitive tasks that negatively impact their ability to conduct and prioritize investigations of critical events. They don’t have the time, or bandwidth, to sift through data feeds or sources to identify and synthesize intelligence related to an incident.

The Rekt Test: 12 Questions to Assess Your Blockchain Security

At Fireblocks, we firmly believe that industry collaboration and intelligence-sharing drives adoption of the best security practices and advances the ecosystem as a whole. This week, Fireblocks, along with fellow Web3 cybersecurity leaders, released the Rekt Test, a simple yet powerful guide for any business to test and assess the security of their blockchain application.

Multiple Junos OS Vulnerabilities Could lead to Unauthenticated Remote Code Execution

On August 17th, 2023, Juniper Networks released out-of-band fixes for multiple vulnerabilities that could be chained together to achieve unauthenticated remote code execution (RCE) on SRX and EX series devices. The vulnerabilities impact the J-Web component of Junos OS, the operating system running on the devices.

Tennessee Employees Lose Their Data to Consolidated Retirement System Breach

The Tennessee Consolidated Retirement System is a retirement and benefits program administered to many full-time employees throughout the state. If you are an employee within the state of Tennessee, there's a good chance that your data is tied up in this system and that you're relying on the program administrators to protect your personal and financial information.

Weekly Cybersecurity Recap August 18

Financial institutions and state government agencies were the main targets of hackers this week. Major organizations like Bank of America and Hospitality Staffing Solutions were hit hard resulting in huge data losses for citizens, and the states of Pennsylvania, Vermont, and Tennessee each experienced major data losses in their regulatory bodies or programs. Learn more about each of these serious data breaches and find out if your information is safe.